{"id":36516,"date":"2024-11-30T02:31:55","date_gmt":"2024-11-30T01:31:55","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=36516"},"modified":"2024-12-07T06:31:54","modified_gmt":"2024-12-07T05:31:54","slug":"windows-server-2012-unofficial-0patch-fix-for-mow-0-day-vulnerability","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/11\/30\/windows-server-2012-unofficial-0patch-fix-for-mow-0-day-vulnerability\/","title":{"rendered":"Windows Server 2012: Unofficial 0patch fix for MoW 0-day vulnerability"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px; display: inline; float: left;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/11\/30\/windows-server-2012-inoffizieller-0patch-fix-fuer-mow-0-day-schwachstelle\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]ACROS Security has developed a fix for a previously unknown 0-day vulnerability in the Mark of the Web security feature of Windows Server 2012 and Server 2012 R2. The fix is available to customers via a 0patch micro-patch and enables the affected installations to be secured.<\/p>\n<p><!--more--><\/p>\n<p>Security researchers from ACROS Security have recently discovered a previously unknown 0-day vulnerability in Windows Server 2012 and Server 2012 R2. The vulnerability allows an attacker to bypass an enforced Mark of the Web security check for certain file types. This can be seen in the following tweet and the blog post <a href=\"https:\/\/blog.0patch.com\/2024\/11\/windows-server-2012-mark-of-web.html\" target=\"_blank\" rel=\"noopener\">Windows Server 2012 Mark of the Web Vulnerability (0day) &#8211; and Free Micropatches for it<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.0patch.com\/2024\/11\/windows-server-2012-mark-of-web.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/L6c4CM76\/image.png\" alt=\"0patch 0-day fix\" width=\"586\" height=\"458\" \/><\/a><\/p>\n<p>The analysis revealed that the vulnerability has existed undetected in Windows Server 2012 for over two years and has not yet been patched by Microsoft. According to Mitja Kolsek, the vulnerability is even present on fully updated servers with extended security updates.<\/p>\n<p>ACROS Security has reported this problem to Microsoft and, as usual, issued micropatches for it. The micropatches can be used free of charge via the 0patch agent until Microsoft has provided an official update. ACROS Security does not disclose the details of the vulnerability, but provides some further information in the linked blog post. Micropatches have been provided for the following operating systems:<\/p>\n<ul>\n<li>Windows Server 2012 updated until October 2023<\/li>\n<li>Windows Server 2012 R2 updated until October 2023<\/li>\n<\/ul>\n<p>There is also the micropatch for Windows versions that still receive Windows updates (Windows Server 2012 with ESU).<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/\">0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixes a Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixes Windows Installer 0-day Local Privilege Escalation vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\">0patch fixes 0-day in Internet Explorer<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/03\/24\/0patch-fixt-cve-2021-2687-im-dns-server-von-windows-server-2008-r2\/\">0patch fixes CVE-2021-26877 in the DNS server of Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/07\/0patch-fixt-windows-installer-lpe-bug-cve-2021-26415\/\">0patch fixes Windows Installer LPE-Bug (CVE-2021-26415)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/18\/0patch-bietet-support-fr-windows-10-version-1809-nach-eol\/\">0Patch provides support for Windows 10 version 1809 after EOL<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/06\/21\/windows-10-v180x-0patch-fixt-ie-schwachstelle-cve-2021-31959\/\">Windows 10 V180x: 0Patch fixes IE vulnerability CVE-2021-31959<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/07\/0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-6-aug-2021\/\">0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 6, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/20\/2-0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-19-aug-2021\/\">2nd 0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 19, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch fix for MSHTML vulnerability (CVE-2021-40444)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/11\/13\/0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service\/\">0patch fixes LPE Vulnerability (CVE-2021-34484) in Windows User Profile Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/11\/27\/0patch-fixt-lpe-schwachstelle-cve-2021-24084-in-mobile-device-management-service\/\">0patch fixes LPE vulnerability (CVE-2021-24084) in Mobile Device Management Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/12\/03\/0patch-fixt-installertakeover-lpe-schwachstelle-in-windows\/\">0patch fixes InstallerTakeOver LPE 0-day vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/12\/24\/0patch-fixt-ms-officecmd-rce-schwachstelle-in-windows\/\">0patch fixes ms-officecmd RCE vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/14\/0patch-fixt-remotepotato0-schwachstelle-in-windows\/\">0patch fixes RemotePotato0 vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/03\/22\/0patch-fixt-erneut-schwachstelle-cve-2021-34484-in-windows-10-server-2019\/\">0patch fixes again vulnerability CVE-2021-34484 in Windows 10\/Server 2019<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/18\/0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows\/\">0Patch fixes vulnerabilities (CVE-2022-26809 and CVE-2022-22019) in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/06\/10\/windows-msdt-0-day-schwachstelle-dogwalk-erhlt-0patch-fix\/\">Windows MSDT 0-day vulnerability \"DogWalk\" receives 0patch fix<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/07\/01\/0patch-fixes-all-known-and-exploitable-windows-ntlm-kerberos-vulnerabilities\/\">0patch fixes all known and exploitable Windows NTLM\/Kerberos vulnerabilities<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/09\/15\/0patch-fixt-memory-corruption-schwachstelle-cve-2022-35742-in-microsoft-outlook-2010\/\">0patch fixes Memory Corruption vulnerability (CVE-2022-35742) in Microsoft Outlook 2010<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/10\/13\/windows-7-server-2008-r2-erhalten-auch-2023-und-2024-0patch-micropatches\/\">Windows 7\/Server 2008 R2 receive 0patch micropatches in 2023 and 2024<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/10\/18\/windows-0patch-micropatch-fr-motow-zip-file-bug-kein-cve\/\">Windows: 0Patch Micropatch for MOTOW ZIP file bug (0-day, no CVE)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/10\/29\/windows-0patch-micropatche-fr-motw-bypassing-0-day-kein-cve\/\" rel=\"bookmark\">Windows: 0Patch micropatch for MotW bypassing 0-day (no CVE)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/10\/26\/0patch-micropatches-fur-microsoft-office-sicherheitsfunktion-umgehen-cve-2023-33150\/\" rel=\"bookmark\">0patch Micropatches for Microsoft Office security feature bypass (CVE-2023-33150)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]ACROS Security has developed a fix for a previously unknown 0-day vulnerability in the Mark of the Web security feature of Windows Server 2012 and Server 2012 R2. The fix is available to customers via a 0patch micro-patch and enables &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/11\/30\/windows-server-2012-unofficial-0patch-fix-for-mow-0-day-vulnerability\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,580,2],"tags":[69,492],"class_list":["post-36516","post","type-post","status-publish","format-standard","hentry","category-ios","category-security","category-windows","tag-security","tag-windows-server-2012"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=36516"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36516\/revisions"}],"predecessor-version":[{"id":36517,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/36516\/revisions\/36517"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=36516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=36516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=36516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}